| packages/nixpkgs/s2n-tls | C99 implementation of the TLS/SSL protocols |
| packages/nixpkgs/tlsx | TLS grabber focused on TLS based data collection |
| packages/nixpkgs/shadow-tls | Proxy to expose real tls handshake to the firewall |
| packages/nixpkgs/gitls | Tools to enumerate git repository URL |
| packages/nixpkgs/natls | 'ls' replacement you never knew you needed |
| packages/nixpkgs/rPackages.tls | |
| packages/nixpkgs/ocamlPackages.tls | TLS in pure OCaml |
| packages/nixpkgs/sbclPackages.cl-tls | |
| packages/nixpkgs/ktls-utils | TLS handshake utilities for in-kernel TLS consumers |
| packages/nixpkgs/haskellPackages.tls | TLS protocol native implementation |
| packages/nixpkgs/_9ptls | mount.9ptls mount helper |
| packages/nixpkgs/restls | Perfect Impersonation of TLS |
| packages/nixpkgs/ocamlPackages_latest.tls | TLS in pure OCaml |
| packages/nixpkgs/ntbtls | Tiny TLS 1.2 only implementation |
| packages/nixpkgs/fortls | Fortran Language Server |
| packages/nixpkgs/ocamlPackages.tls-eio | TLS in pure OCaml |
| packages/nixpkgs/ocamlPackages.tls-lwt | TLS in pure OCaml |
| packages/nixpkgs/gnutls | GNU Transport Layer Security Library |
| packages/nixpkgs/tlspool | TLS daemon with PKCS #11 backend |
| packages/nixpkgs/sbclPackages.cl-xmpp-tls | |
| packages/nixpkgs/rustls-ffi | C-to-rustls bindings |
| packages/nixpkgs/tlsinfo | Tool to analyze and troubleshoot TLS connections |
| packages/nixpkgs/ocamlPackages.tls-async | Transport Layer Security purely in OCaml, Async layer |
| packages/nixpkgs/ocamlPackages_latest.tls-eio | TLS in pure OCaml |
| packages/nixpkgs/ocamlPackages_latest.tls-lwt | TLS in pure OCaml |
| packages/nixpkgs/ocamlPackages.tls-miou-unix | Transport Layer Security purely in OCaml, Miou+Unix layer |
| packages/nixpkgs/haskellPackages.soap-tls | TLS-enabled SOAP transport (using tls package) |
| packages/nixpkgs/haskellPackages.warp-tls | HTTP over TLS support for Warp via the TLS package |
| packages/nixpkgs/haskellPackages.warpZ-tls | HTTP over TLS support for Warp via the TLS package |
| packages/nixpkgs/quictls | TLS/SSL and crypto library with QUIC APIs |
| packages/nixpkgs/mbedtls | Portable cryptographic and TLS library, formerly known as PolarSSL |
| packages/nixpkgs/textlsp | Language server for text spell and grammar check with various tools |
| packages/nixpkgs/ocamlPackages.tls-mirage | Transport Layer Security purely in OCaml, MirageOS layer |
| packages/nixpkgs/haskellPackages.warp-tls-uid | set group and user id before running server |
| packages/nixpkgs/haskellPackages.tls-debug | Set of programs for TLS testing and debugging |
| packages/nixpkgs/haskellPackages.tls-extra | TLS extra default values and helpers |
| packages/nixpkgs/haskellPackages.http2-tls | Library for HTTP/2 over TLS |
| packages/nixpkgs/haskellPackages.yesod-tls | Provides main functions using warp-tls for yesod projects |
| packages/nixpkgs/guile-gnutls | Guile bindings for GnuTLS library |
| packages/nixpkgs/ocamlPackages_latest.tls-async | Transport Layer Security purely in OCaml, Async layer |
| packages/nixpkgs/haskellPackages.tls_2_1_9 | TLS protocol native implementation |
| packages/nixpkgs/ocamlPackages_latest.tls-miou-unix | Transport Layer Security purely in OCaml, Miou+Unix layer |
| packages/nixpkgs/haskellPackages.scotty-tls | TLS for Scotty |
| packages/nixpkgs/haskellPackages.acid-state-tls | Add TLS support for Data |
| packages/nixpkgs/emacsPackages.mandoku-tls | |
| packages/nixpkgs/haskellPackages.tls_2_1_12 | TLS protocol native implementation |
| packages/nixpkgs/haskellPackages.tls_2_1_13 | TLS protocol native implementation |
| packages/nixpkgs/libretls | Libtls for OpenSSL |
| packages/nixpkgs/rPackages.tlsh | |
| packages/nixpkgs/rustls-libssl | Partial reimplementation of the OpenSSL 3 libssl ABI using rustls |
| packages/nixpkgs/ocamlPackages_latest.tls-mirage | Transport Layer Security purely in OCaml, MirageOS layer |
| packages/nixpkgs/haskellPackages.warp-tls-simple | Simple TLS configuration for Warp |
| packages/nixpkgs/haskellPackages.http-client-tls | http-client backend using the connection package and tls library |
| packages/nixpkgs/faustlsp | Language Server Protocol (LSP) implementation for the Faust programming language |
| packages/nixpkgs/python313Packages.tls-parser | Small library to parse TLS records |
| packages/nixpkgs/python314Packages.tls-parser | Small library to parse TLS records |
| packages/nixpkgs/python313Packages.tls-client | Advanced HTTP Library |
| packages/nixpkgs/python314Packages.tls-client | Advanced HTTP Library |
| packages/nixpkgs/postfix-tlspol | Lightweight MTA-STS + DANE/TLSA resolver and TLS policy server for Postfix, prioritizing DANE |
| packages/nixpkgs/mbedtls_2 | Portable cryptographic and TLS library, formerly known as PolarSSL |
| packages/nixpkgs/haskellPackages.ClickHaskell-tls | ClickHaskell TLS extension |
| packages/nixpkgs/python312Packages.tls-parser | Small library to parse TLS records |
| packages/nixpkgs/haskellPackages.pipes-network-tls | TLS-secured network connections support for pipes |
| packages/nixpkgs/vimPlugins.nvim-jdtls | |
| packages/nixpkgs/tlsclient | tlsclient command line utility |
| packages/nixpkgs/python312Packages.tls-client | Advanced HTTP Library |
| packages/nixpkgs/terraform-providers.tls | |
| packages/nixpkgs/haskellPackages.network-simple-tls | Simple interface to TLS secured network sockets |
| packages/nixpkgs/libtlsrpt | Low-level C Library to implement TLSRPT into a MTA |
| packages/nixpkgs/tclPackages.tcltls | OpenSSL / RSA-bsafe Tcl extension |
| packages/nixpkgs/haskellPackages.tls-session-manager | In-memory TLS session DB and session ticket |
| packages/nixpkgs/haskellPackages.network-conduit-tls | Create TLS-aware network code with conduits |
| packages/nixpkgs/tlsrpt-reporter | Application suite to receive TLSRPT datagrams and to generate and deliver TLSRPT reports |
| packages/nixpkgs/rtl-sdr-librtlsdr | Software to turn the RTL2832U into a SDR receiver |
| packages/nixpkgs/haskellPackages.metro-transport-tls | TLS transport for metro |
| packages/nixpkgs/haskellPackages.warp-tls_3_4_13 | HTTP over TLS support for Warp via the TLS package |
| packages/nixpkgs/python313Packages.tlsh | Trend Micro Locality Sensitive Hash |
| packages/nixpkgs/python314Packages.tlsh | Trend Micro Locality Sensitive Hash |
| packages/nixpkgs/python313Packages.ttls | Module to interact with Twinkly LEDs |
| packages/nixpkgs/python314Packages.ttls | Module to interact with Twinkly LEDs |
| packages/nixpkgs/haskellPackages.happstack-server-tls | extend happstack-server with https:// support (TLS/SSL) |
| packages/nixpkgs/haskellPackages.rustls | TLS bindings for Rustls |
| packages/nixpkgs/haskellPackages.htlset | Heterogenous Set |
| packages/nixpkgs/haskellPackages.rtlsdr | Bindings to librtlsdr |
| packages/nixpkgs/haskellPackages.gnutls | Bindings for GNU libgnutls |
| packages/nixpkgs/haskellPackages.transient-universe-tls | transient with secure communications |
| packages/nixpkgs/gotlsaflare | Update TLSA DANE records on cloudflare from x509 certificates |
| packages/nixpkgs/texlivePackages.tlshell | GUI frontend (tcl/tk-based) for tlmgr |
| packages/nixpkgs/haskellPackages.peyotls | Pretty Easy YOshikuni-made TLS library |
| packages/nixpkgs/soapyrtlsdr | SoapySDR plugin for RTL-SDR devices |
| packages/nixpkgs/python312Packages.tlsh | Trend Micro Locality Sensitive Hash |
| packages/nixpkgs/python312Packages.ttls | Module to interact with Twinkly LEDs |
| packages/nixpkgs/rPackages.plotlsirm | |
| packages/nixpkgs/python313Packages.tlslite-ng | Implementation of SSL and TLS |
| packages/nixpkgs/python314Packages.tlslite-ng | Implementation of SSL and TLS |
| packages/nixpkgs/haskellPackages.tls-sslkeylogfile | SSLKEYLOGFILE support for Haskell |
| packages/nixpkgs/linphonePackages.bc-mbedtls | Portable cryptographic and TLS library, formerly known as PolarSSL (Linphone fork) |
| packages/nixpkgs/haskellPackages.peyotls-codec | Codec parts of Pretty Easy YOshikuni-made TLS library |
| packages/nixpkgs/haskellPackages.happstack-server-tls-cryptonite | Extend happstack-server with native HTTPS support (TLS/SSL) |
| packages/nixpkgs/haskellPackages.libretls | libtls bindings |
| packages/nixpkgs/haskellPackages.hsgnutls | Library wrapping the GnuTLS API |
| packages/nixpkgs/haskellPackages.hsgnutls-yj | Library wrapping the GnuTLS API |
| packages/nixpkgs/python312Packages.tlslite-ng | Implementation of SSL and TLS |
| packages/nixpkgs/haskellPackages.http-client-rustls | http-client TLS backend using Rustls |
| packages/nixpkgs/python313Packages.pyrtlsdr | Python wrapper for librtlsdr (a driver for Realtek RTL2832U based SDR's) |
| packages/nixpkgs/python314Packages.pyrtlsdr | Python wrapper for librtlsdr (a driver for Realtek RTL2832U based SDR's) |
| packages/nixpkgs/python313Packages.python-mbedtls | Cryptographic library with an mbed TLS back end |
| packages/nixpkgs/python314Packages.python-mbedtls | Cryptographic library with an mbed TLS back end |
| packages/nixpkgs/python312Packages.pyrtlsdr | Python wrapper for librtlsdr (a driver for Realtek RTL2832U based SDR's) |
| packages/nixpkgs/python313Packages.python3-gnutls | Python wrapper for the GnuTLS library |
| packages/nixpkgs/python314Packages.python3-gnutls | Python wrapper for the GnuTLS library |
| packages/nixpkgs/python312Packages.python-mbedtls | Cryptographic library with an mbed TLS back end |
| packages/nixpkgs/python313Packages.dtlssocket | Cython wrapper for tinydtls with a Socket like interface |
| packages/nixpkgs/python314Packages.dtlssocket | Cython wrapper for tinydtls with a Socket like interface |
| packages/nixpkgs/python312Packages.python3-gnutls | Python wrapper for the GnuTLS library |
| packages/nixpkgs/ngtcp2-gnutls | Effort to implement RFC9000 QUIC protocol |
| packages/nixpkgs/python312Packages.dtlssocket | Cython wrapper for tinydtls with a Socket like interface |
| packages/nixpkgs/terraform-providers.hashicorp_tls | |
| packages/nixpkgs/libubox-mbedtls | C utility functions for OpenWrt |
| packages/nixpkgs/ustream-ssl-mbedtls | ustream SSL wrapper |
| packages/nixpkgs/rtmpdump_gnutls | Toolkit for RTMP streams |
| options/nixos/services.bacula-sd.tls.require | Require TLS or TLS-PSK encryption
|
| options/nixos/services.bacula-fd.tls.require | Require TLS or TLS-PSK encryption
|
| options/nixos/services.bacula-dir.tls.require | Require TLS or TLS-PSK encryption
|
| options/nixos/services.movim.h2o.tls.policy | add will additionally listen for TLS connections. only will
disable TLS connections. force will redirect non-TLS traffic
to the TLS connection.
|
| options/nixos/services.movim.h2o.tls | TLS options for virtual host
|
| options/nixos/services.bacula-sd.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/services.bacula-fd.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/services.h2o.hosts.<name>.tls.policy | add will additionally listen for TLS connections. only will
disable TLS connections. force will redirect non-TLS traffic
to the TLS connection.
|
| options/nixos/services.bacula-dir.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/services.bacula-sd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| options/nixos/services.bacula-fd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| options/nixos/services.h2o.hosts.<name>.tls | TLS options for virtual host
|
| options/nixos/services.nghttpx.tls | TLS certificate and key paths
|
| options/nixos/services.bacula-fd.tls | TLS Options for the File Daemon
|
| options/nixos/services.bacula-sd.tls | TLS Options for the Storage Daemon
|
| options/nixos/services.bacula-dir.tls | TLS Options for the Director
|
| options/nixos/services.vault.tlsKeyFile | TLS private key file
|
| options/nixos/services.gitlab.smtp.tls | Whether to use TLS wrapper-mode.
|
| options/nixos/services.movim.h2o.tls.port | Override the default TLS port for this virtual host.
|
| options/nixos/services.coder.tlsKey | The path to the TLS key.
|
| options/nixos/services.vault.tlsCertFile | TLS certificate file
|
| options/nixos/services.dolibarr.h2o.tls.policy | add will additionally listen for TLS connections. only will
disable TLS connections. force will redirect non-TLS traffic
to the TLS connection.
|
| options/nixos/services.nghttpx.tls.key | Path to the TLS key file.
|
| options/nixos/services.nghttpx.tls.crt | Path to the TLS certificate file.
|
| options/nixos/services.coder.tlsCert | The path to the TLS certificate.
|
| options/nixos/services.h2o.hosts.<name>.tls.port | Override the default TLS port for this virtual host.
|
| options/nixos/services.dendrite.tlsKey | The path to the TLS key.
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
|
| options/nixos/services.cfssl.tlsCert | Other endpoint's CA to set up TLS protocol.
|
| options/nixos/services.bacula-fd.tls.enable | Specifies if TLS should be enabled
|
| options/nixos/services.bacula-sd.tls.enable | Specifies if TLS should be enabled
|
| options/nixos/services.coturn.no-tls | Disable TLS client listener
|
| options/nixos/services.dendrite.tlsCert | The path to the TLS certificate.
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
|
| options/nixos/services.bacula-dir.tls.enable | Specifies if TLS should be enabled
|
| options/nixos/services.llama-swap.tls.enable | Whether to enable TLS encryption.
|
| options/nixos/services.pgmanage.tls.key | TLS key
|
| options/nixos/services.llama-swap.tls.keyFile | Path to the TLS private key file
|
| options/nixos/services.llama-swap.tls.certFile | Path to the TLS certificate file
|
| options/nixos/services.dolibarr.h2o.tls | TLS options for virtual host
|
| options/nixos/services.movim.h2o.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| options/nixos/services.pgmanage.tls.cert | TLS certificate
|
| options/nixos/services.zitadel.tlsMode | The TLS mode to use
|
| options/nixos/services.athens.tlsKeyFile | Path to the TLS key file.
|
| options/nixos/services.pgmanage.tls | These options tell pgmanage where the TLS Certificate and Key files
reside
|
| options/nixos/services.h2o.hosts.<name>.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| options/nixos/services.glusterfs.tlsSettings.tlsPem | Path to the certificate used for TLS.
|
| options/nixos/services.oauth2-proxy.tls.enable | Whether to serve over TLS.
|
| options/nixos/services.athens.tlsCertFile | Path to the TLS certificate file.
|
| options/nixos/services.cfssl.tlsRemoteCa | CAs to trust for remote TLS requests.
|
| options/nixos/services.acme-dns.settings.api.tls | TLS backend to use.
|
| options/nixos/services.dolibarr.h2o.tls.port | Override the default TLS port for this virtual host.
|
| options/nixos/services.glusterfs.tlsSettings.tlsKeyPath | Path to the private key used for TLS.
|
| options/nixos/services.skydns.etcd.tlsPem | Skydns path of TLS client certificate - public key.
|
| options/nixos/services.skydns.etcd.tlsKey | Skydns path of TLS client certificate - private key.
|
| options/nixos/services.synergy.server.tls.cert | The TLS certificate to use for encryption.
|
| options/darwin/services.synergy.client.tls.cert | The TLS certificate to use for encryption.
|
| options/darwin/services.synergy.server.tls.cert | The TLS certificate to use for encryption.
|
| options/nixos/services.bacula-sd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/services.bacula-fd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| options/nixos/services.oauth2-proxy.tls.key | Path to private key file.
|
| options/nixos/services.prosody.modules.tls | Add support for secure TLS on c2s/s2s connections
|
| options/nixos/services.thanos.rule.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| options/nixos/services.synergy.server.tls.enable | Whether TLS encryption should be used
|
| options/nixos/services.nezha-agent.settings.tls | Enable SSL/TLS encryption.
|
| options/nixos/services.omnom.settings.smtp.tls | Whether to enable Whether TLS encryption should be used..
|
| options/darwin/services.synergy.server.tls.enable | Whether to enable Whether TLS encryption should be used
|
| options/darwin/services.synergy.client.tls.enable | Whether to enable Whether TLS encryption should be used
|
| options/nixos/services.thanos.rule.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.bacula-sd.director.<name>.tls | TLS Options for the Director in this Configuration.
|
| options/nixos/services.bacula-fd.director.<name>.tls | TLS Options for the Director in this Configuration.
|
| options/nixos/services.thanos.store.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| options/nixos/services.thanos.query.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| options/nixos/services.cfssl.tlsKey | Other endpoint's CA private key
|
| options/nixos/services.dolibarr.h2o.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| options/nixos/services.thanos.query.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.thanos.store.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.maddy.tls.extraConfig | Arguments for the specified certificate loader
|
| options/nixos/services.movim.h2o.tls.extraSettings | Additional TLS/SSL-related configuration options
|
| options/nixos/services.bacula-sd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| options/nixos/services.bacula-fd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| options/nixos/services.h2o.hosts.<name>.tls.extraSettings | Additional TLS/SSL-related configuration options
|
| options/nixos/services.thanos.receive.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| options/nixos/services.thanos.sidecar.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| options/nixos/services.nghttpx.backends.*.params.tls | This option determines whether nghttpx will negotiate its
connection with a backend server using TLS or not
|
| options/nixos/services.thanos.sidecar.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.thanos.receive.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.portunus.ldap.tls | Whether to enable LDAPS protocol
|
| options/nixos/services.maddy.tls.loader | TLS certificates are obtained by modules called "certificate
loaders"
|
| options/nixos/services.coturn.tls-listening-port | TURN listener port for TLS
|
| options/nixos/services.movim.h2o.tls.identity | Key / certificate pairs for the virtual host.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.enable | Whether to enable TLS/SSL.
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.enable | Whether to enable TLS/SSL.
|
| options/nixos/services.thanos.query.grpc-client-tls-key | TLS Key for the client's certificate
|
| options/nixos/services.bacula-sd.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.bacula-fd.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.bacula-dir.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.thanos.query.grpc-client-tls-ca | TLS CA Certificates to use to verify gRPC servers
|
| options/nixos/services.h2o.hosts.<name>.tls.identity | Key / certificate pairs for the virtual host.
|
| options/nixos/services.foundationdb.tls | FoundationDB Transport Security Layer (TLS) settings.
|
| options/nixos/services.neo4j.bolt.tlsLevel | SSL/TSL requirement level for BOLT traffic.
|
| options/nixos/services.librespeed.tlsKey | TLS private key to use
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls | Configuration for secure connections.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls | Configuration for secure connections.
|
| options/nixos/services.thanos.query.grpc-client-tls-cert | TLS Certificates to use to identify this client to the server
|
| options/nixos/services.dolibarr.h2o.tls.extraSettings | Additional TLS/SSL-related configuration options
|
| options/nixos/services.thanos.query-frontend.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| options/nixos/services.movim.h2o.tls.identity.*.key-file | Path to key file
|
| options/home-manager/accounts.email.accounts.<name>.msmtp.tls.fingerprint | Fingerprint of a trusted TLS certificate
|
| options/nixos/services.thanos.query-frontend.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.h2o.hosts.<name>.tls.identity.*.key-file | Path to key file
|
| options/nixos/services.thanos.query.grpc-client-tls-secure | Use TLS when talking to the gRPC server
|
| options/nixos/services.nghttpx.frontends.*.params.tls | Enable or disable TLS
|
| options/nixos/services.coturn.alt-tls-listening-port | Alternative listening port for TLS and DTLS protocols.
|
| options/nixos/services.oauth2-proxy.tls.httpsAddress | addr:port to listen on for HTTPS clients
|
| options/nixos/services.wstunnel.servers.<name>.tlsKey | TLS key to use instead of the hardcoded on in case of HTTPS connections
|
| options/nixos/services.thanos.rule.grpc-server-tls-client-ca | TLS CA to verify clients against
|
| options/nixos/services.wstunnel.clients.<name>.tlsSNI | Use this as the SNI while connecting via TLS
|
| options/nixos/services.soju.tlsCertificate | Path to server TLS certificate.
|
| options/nixos/services.writefreely.database.tls | Whether or not TLS should be used for the database connection.
|
| options/nixos/services.dolibarr.h2o.tls.identity | Key / certificate pairs for the virtual host.
|
| options/nixos/services.bacula-fd.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.bacula-sd.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.maddy.tls.certificates.*.keyPath | Path to the private key used for TLS.
|
| options/nixos/services.maddy.tls.certificates | A list of attribute sets containing paths to TLS certificates and
keys
|
| options/nixos/services.thanos.store.grpc-server-tls-client-ca | TLS CA to verify clients against
|
| options/nixos/services.thanos.query.grpc-server-tls-client-ca | TLS CA to verify clients against
|
| options/nixos/services.soju.tlsCertificateKey | Path to server TLS certificate key.
|
| options/nixos/services.bacula-dir.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.useStartTls | Whether to use STARTTLS.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.useStartTls | Whether to use STARTTLS.
|
| options/nixos/services.maddy.tls.certificates.*.certPath | Path to the certificate used for TLS.
|
| options/nixos/services.movim.h2o.tls.redirectCode | HTTP status used by globalRedirect & forceSSL
|
| options/nixos/services.bacula-sd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.bacula-fd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.foundationdb.tls.allowedPeers | "Peer verification string"
|
| options/nixos/services.vsftpd.ssl_tlsv1 | Only applies if ssl_enable is activated
|
| options/nixos/services.h2o.hosts.<name>.tls.redirectCode | HTTP status used by globalRedirect & forceSSL
|
| options/nixos/services.bacula-sd.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.bacula-fd.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.dolibarr.h2o.tls.identity.*.key-file | Path to key file
|
| packages/nixpkgs/perlPackages.NetSMTPTLS | SMTP client supporting TLS and AUTH |
| options/nixos/services.bacula-dir.tls.certificate | The full path to the PEM encoded TLS certificate
|
| packages/nixpkgs/perl5Packages.NetSMTPTLS | SMTP client supporting TLS and AUTH |
| options/nixos/services.foundationdb.tls.key | Private key file for the certificate.
|
| options/nixos/services.neo4j.ssl.policies.<name>.tlsVersions | Restrict the TLS protocol versions of this policy to those
defined here.
|
| options/nixos/services.thanos.sidecar.grpc-server-tls-client-ca | TLS CA to verify clients against
|
| options/nixos/services.thanos.receive.grpc-server-tls-client-ca | TLS CA to verify clients against
|
| options/nixos/services.outline.smtp.tlsCiphers | Override SMTP cipher configuration.
|
| options/nixos/services.matrix-synapse.settings.listeners.*.tls | Whether to enable TLS on the listener socket.
This option will be ignored for UNIX domain sockets.
|
| options/nixos/services.matrix-synapse.settings.tls_private_key_path | PEM encoded private key for TLS
|
| options/nixos/services.bacula-fd.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.bacula-sd.tls.verifyPeer | Verify peer certificate
|
| options/home-manager/services.podman.builds.<name>.tlsVerify | Require HTTPS and verification of certificates when contacting registries.
|
| options/home-manager/services.podman.images.<name>.tlsVerify | Require HTTPS and verification of certificates when contacting registries.
|
| options/nixos/services.oauth2-proxy.tls.certificate | Path to certificate file.
|
| options/nixos/services.movim.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.bacula-dir.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.h2o.hosts.<name>.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.nghttpx.backends.*.params.redirect-if-not-tls | If true, a backend match requires the frontend connection be
TLS encrypted
|
| options/nixos/services.dolibarr.h2o.tls.redirectCode | HTTP status used by globalRedirect & forceSSL
|
| options/nixos/services.glusterfs.tlsSettings | Make the server communicate via TLS
|
| options/nixos/services.dolibarr.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.headscale.settings.tls_letsencrypt_hostname | Domain name to request a TLS certificate for.
|
| options/nixos/services.thanos.query-frontend.grpc-server-tls-client-ca | TLS CA to verify clients against
|
| options/nixos/services.foundationdb.tls.certificate | Path to the TLS certificate file
|
| options/nixos/services.bacula-sd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.bacula-fd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.bacula-sd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.bacula-fd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.omnom.settings.smtp.tls_allow_insecure | Whether to enable Whether to allow insecure TLS..
|
| options/nixos/services.librespeed.tlsCertificate | TLS certificate to use
|
| options/nixos/services.movim.h2o.tls.identity.*.certificate-file | Path to certificate file
|
| options/nixos/services.h2o.hosts.<name>.tls.identity.*.certificate-file | Path to certificate file
|
| options/nixos/services.glusterfs.tlsSettings.caCert | Path certificate authority used to sign the cluster certificates.
|
| options/nixos/services.headscale.settings.tls_letsencrypt_challenge_type | Type of ACME challenge to use, currently supported types:
HTTP-01 or TLS-ALPN-01.
|
| options/nixos/services.wstunnel.servers.<name>.tlsCertificate | TLS certificate to use instead of the hardcoded one in case of HTTPS connections
|
| options/nixos/services.kubernetes.kubelet.tlsKeyFile | File containing x509 private key matching tlsCertFile.
|
| options/nixos/services.matrix-synapse.settings.tls_certificate_path | PEM encoded X509 certificate for TLS
|
| options/nixos/services.coturn.no-dtls | Disable DTLS client listener
|
| options/nixos/services.kubernetes.kubelet.tlsCertFile | File containing x509 Certificate for HTTPS.
|
| options/nixos/services.bacula-sd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.bacula-fd.director.<name>.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.kanidm.serverSettings.tls_key | TLS key in pem format.
|
| options/nixos/services.tlsrpt.enable | Whether to enable the TLSRPT services.
|
| options/nixos/services.dolibarr.h2o.tls.identity.*.certificate-file | Path to certificate file
|
| options/nixos/virtualisation.podman.networkSocket.tls.cert | Path to certificate describing the server.
|
| options/nixos/services.nvme-rs.settings.email.use_tls | Use TLS for SMTP connection
|
| options/nixos/services.kanidm.server.settings.tls_key | TLS key in pem format.
|
| options/nixos/services.wstunnel.clients.<name>.tlsVerifyCertificate | Whether to verify the TLS certificate of the server
|
| options/nixos/services.kanidm.serverSettings.tls_chain | TLS chain in pem format.
|
| options/nixos/services.kanidm.server.settings.tls_chain | TLS chain in pem format.
|
| options/nixos/virtualisation.podman.networkSocket.tls.key | Path to the private key corresponding to the server certificate
|
| options/nixos/virtualisation.podman.networkSocket.tls.cacert | Path to CA certificate to use for client authentication.
|
| options/nixos/services.kubernetes.apiserver.tlsKeyFile | Kubernetes apiserver private key file.
|
| packages/nixpkgs/perl538Packages.NetSMTPTLS | SMTP client supporting TLS and AUTH |
| packages/nixpkgs/perl540Packages.NetSMTPTLS | SMTP client supporting TLS and AUTH |
| options/nixos/services.tlsrpt.package | The tlsrpt-reporter package to use.
|
| options/nixos/services.kubernetes.apiserver.tlsCertFile | Kubernetes apiserver certificate file.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.certificatesFile | Path to file containing certificate authorities that should
be used to validate the connection authenticity
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.certificatesFile | Path to file containing certificate authorities that should
be used to validate the connection authenticity
|
| options/home-manager/programs.senpai.config.address | The address (host[:port]) of the IRC server. senpai uses TLS
connections by default unless you specify tls option to be false
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.tlsTimeout | Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server.
|
| options/nixos/services.headscale.settings.tls_letsencrypt_listen | When HTTP-01 challenge is chosen, letsencrypt must set up a
verification endpoint, and it will be listening on:
:http = port 80.
|
| options/nixos/services.resolved.dnsovertls | If set to
"true":
all DNS lookups will be encrypted
|
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.tls | Whether to enable TLS on the listener socket.
This option will be ignored for UNIX domain sockets.
|
| packages/nixpkgs/hitch | Libev-based high performance SSL/TLS proxy by Varnish Software |
| options/nixos/services.postfix.settings.main.smtpd_tls_security_level | The server TLS security level
|
| options/nixos/services.postfix.tlsTrustedAuthorities | File containing trusted certification authorities (CA) to verify certificates of mailservers contacted for mail delivery
|
| options/nixos/services.prometheus.remoteRead.*.tls_config | Configures the remote read request's TLS settings.
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config | Configures the remote write request's TLS settings.
|
| options/nixos/services.listmonk.database.settings.smtp.*.tls_type | Type of TLS authentication with the SMTP server
|
| options/nixos/services.postfix-tlspol.enable | Whether to enable postfix-tlspol.
|
| options/nixos/services.prometheus.alertmanagerGotify.gotifyEndpoint.tls | If your gotify endpoint uses https, leave this option set to default
|
| options/nixos/services.kubernetes.controllerManager.tlsKeyFile | Kubernetes controller-manager private key file.
|
| options/nixos/services.kubernetes.controllerManager.tlsCertFile | Kubernetes controller-manager certificate file.
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config | Configures the scrape request's TLS settings.
|
| options/nixos/services.postfix-tlspol.package | The postfix-tlspol package to use.
|
| options/nixos/services.postfix.settings.main.smtp_tls_security_level | The client TLS security level.
Use dane with a local DNSSEC validating DNS resolver enabled.
https://www.postfix.org/postconf.5.html#smtp_tls_security_level
|
| options/nixos/services.tlsrpt.reportd.extraFlags | List of extra flags to pass to the tlsrpt-reportd executable
|
| options/nixos/users.ldap.useTLS | If enabled, use TLS (encryption) over an LDAP (port 389)
connection
|
| options/nixos/services.headscale.settings.tls_cert_path | Path to already created certificate.
|
| options/nixos/services.tlsrpt.fetcher.settings | Flags from tlsrpt-fetcher(1) as key-value pairs.
|
| options/nixos/services.tlsrpt.reportd.settings | Flags from tlsrpt-reportd(1) as key-value pairs.
|
| options/nixos/services.go-camo.sslKey | Path to TLS private key.
|
| options/nixos/services.headscale.settings.tls_key_path | Path to key for already created certificate.
|
| options/nixos/services.postfix-tlspol.settings | The postfix-tlspol configuration file as a Nix attribute set
|
| options/nixos/services.tlsrpt.collectd.extraFlags | List of extra flags to pass to the tlsrpt-reportd executable
|
| options/nixos/services.go-camo.sslCert | Path to TLS certificate.
|
| options/nixos/services.doh-server.settings.upstream | Upstream DNS resolver
|
| options/nixos/services.tlsrpt.configurePostfix | Whether to configure permissions to allow integration with Postfix.
|
| options/nixos/services.scrutiny.settings.web.influxdb.tls.insecure_skip_verify | Whether to enable skipping TLS verification when connecting to InfluxDB.
|
| options/nixos/services.tlsrpt.collectd.settings | Flags from tlsrpt-collectd(1) as key-value pairs.
|
| options/nixos/services.tlsrpt.reportd.settings.dbname | Path to the sqlite database.
|
| options/nixos/services.h2o.defaultTLSRecommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.tlsrpt.fetcher.settings.storage | Path to the collectd sqlite database.
|
| options/nixos/services.postfix-tlspol.settings.server.log-level | Log level
|
| options/nixos/services.invidious.nginx.enable | Whether to configure nginx as a reverse proxy for Invidious
|
| options/nixos/services.postfix-tlspol.settings.server.cache-file | Path to the cache file.
|
| options/nixos/services.tlsrpt.collectd.settings.storage | Storage backend definition.
|
| options/nixos/services.postfix-tlspol.configurePostfix | Whether to configure the required settings to use postfix-tlspol in the local Postfix instance.
|
| options/nixos/services.coturn.dh-file | Use custom DH TLS key, stored in PEM format in the file.
|
| options/nixos/services.uhub.<name>.enableTLS | Whether to enable TLS support.
|
| options/nixos/services.tlsrpt.reportd.settings.fetchers | Comma-separated list of fetcher programs that retrieve collectd data.
|
| options/nixos/services.molly-brown.keyPath | Path to TLS key
|
| options/nixos/services.postfix-tlspol.settings.dns.address | IP and port to your DNS resolver
|
| options/nixos/services.resolved.settings.Resolve.DNSOverTLS | Whether to use TLS encryption for DNS queries
|
| options/nixos/services.postfix-tlspol.settings.server.address | Path or address/port where postfix-tlspol binds its socket to.
|
| options/nixos/services.cfssl.mutualTlsCa | Mutual TLS - require clients be signed by this CA.
|
| options/nixos/services.tlsrpt.reportd.settings.log_level | Level of log messages to emit.
|
| options/nixos/services.tlsrpt.fetcher.settings.log_level | Level of log messages to emit.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.starttls | set to true for using STARTTLS to start a TLS connection
|
| options/nixos/services.cfssl.mutualTlsCn | Mutual TLS - regex for whitelist of allowed client CNs.
|
| options/nixos/services.skydns.etcd.caCert | Skydns path of TLS certificate authority public key.
|
| options/nixos/services.nginx.sslCiphers | Ciphers to choose from when negotiating TLS handshakes.
|
| options/nixos/services.ncps.cache.redis.useTLS | Use TLS for Redis connection.
|
| options/nixos/services.tlsrpt.collectd.settings.log_level | Level of log messages to emit.
|
| options/nixos/services.postfix-tlspol.settings.server.prefetch | Whether to prefetch DNS records when the TTL of a cached record is about to expire.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config | TLS configuration.
|
| packages/nixpkgs/testssl | CLI tool to check a server's TLS/SSL capabilities |
| options/nixos/services.ddclient.ssl | Whether to use SSL/TLS to connect to dynamic DNS provider.
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config | Configures the scrape request's TLS settings.
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.postfix.enableSubmissions | Whether to enable the submissions service configured in master.cf
|
| options/nixos/services.stunnel.enable | Whether to enable the stunnel TLS tunneling service.
|
| options/nixos/services.tlsrpt.collectd.settings.socketmode | Permissions on the UNIX socket.
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| packages/nixpkgs/sslscan | Tests SSL/TLS services and discover supported cipher suites |
| options/nixos/services.tlsrpt.collectd.settings.socketname | Path at which the UNIX socket will be created.
|
| options/nixos/services.syncplay.certDir | TLS certificates directory to use for encryption
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config | TLS configuration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config | TLS configuration.
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.kresd.listenTLS | Addresses and ports on which kresd should provide DNS over TLS (see RFC 7858)
|
| options/nixos/services.public-inbox.nntp.key | Path to TLS key to use for connections to public-inbox-nntpd(1).
|
| options/nixos/services.public-inbox.imap.key | Path to TLS key to use for connections to public-inbox-imapd(1).
|
| options/nixos/services.postfix.enableSubmission | Whether to enable the `submission` service configured in master.cf
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.postfix.settings.main.smtpd_tls_chain_files | List of paths to the server private keys and certificates.
The order of items matters and a private key must always be followed by the corresponding certificate.
https://www.postfix.org/postconf.5.html#smtpd_tls_chain_files
|
| options/nixos/services.tlsrpt.reportd.settings.http_script | Call to an HTTPS client, that accepts the URL on the commandline and the request body from stdin.
|
| options/nixos/services.public-inbox.imap.cert | Path to TLS certificate to use for connections to public-inbox-imapd(1).
|
| options/nixos/services.public-inbox.nntp.cert | Path to TLS certificate to use for connections to public-inbox-nntpd(1).
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.infinoted.keyFile | Private key to use for TLS
|
| options/nixos/services.postfix.settings.main.smtp_tls_CAfile | File containing CA certificates of root CAs trusted to sign either remote SMTP server certificates or intermediate CA certificates
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config | TLS configuration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config | TLS configuration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config | TLS configuration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config | TLS configuration.
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.maddy.config | Server configuration, see
https://maddy.email for
more information
|
| options/nixos/services.portunus.port | Port where the Portunus webserver should listen on
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config | Configures the Consul request's TLS settings.
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.tlsrpt.reportd.settings.contact_info | Contact information embedded into the reports.
|
| options/nixos/services.h2o.hosts | The hosts config to be merged with the settings
|
| options/nixos/services.davis.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.slskd.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.nginx.sslProtocols | Allowed TLS protocol versions.
|
| options/nixos/services.movim.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.aaa_id | Server side EAP-Identity to expect in the EAP method
|
| options/nixos/services.httpd.sslProtocols | Allowed SSL/TLS protocol versions.
|
| options/nixos/services.snipe-it.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.nsd.remoteControl.port | Port number for remote control operations (uses TLS over TCP).
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config | TLS configuration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.tt-rss.email.security | Used to select a secure SMTP connection
|
| options/nixos/services.molly-brown.certPath | Path to TLS certificate
|
| options/nixos/services.sslmate-agent.enable | Whether to enable sslmate-agent, a daemon for managing SSL/TLS certificates on a server.
|
| options/nixos/services.cfssl.mutualTlsClientCert | Mutual TLS - client certificate to call remote instance requiring client certs.
|
| packages/nixpkgs/perlPackages.NetSMTPTLSButMaintained | SMTP client supporting TLS and AUTH (DEPRECATED, use Net::SMTPS instead) |
| options/nixos/services.cfssl.mutualTlsClientKey | Mutual TLS - client key to call remote instance requiring client certs
|
| options/nixos/services.fluidd.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.akkoma.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.gancio.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.monica.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.matomo.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.pgadmin.emailServer.useTLS | Whether to enable TLS for connecting to the SMTP server.
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| packages/nixpkgs/perl5Packages.NetSMTPTLSButMaintained | SMTP client supporting TLS and AUTH (DEPRECATED, use Net::SMTPS instead) |
| options/nixos/services.prometheus.remoteWrite.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/security.acme.certs.<name>.ocspMustStaple | Turns on the OCSP Must-Staple TLS extension
|
| options/nixos/services.movim.h2o.settings | Attrset to be transformed into YAML for host config
|
| packages/nixpkgs/sslmate-agent | Daemon for managing SSL/TLS certificates on a server |
| packages/nixpkgs/redli | Humane alternative to the Redis-cli and TLS |
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config | TLS configuration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config | TLS configuration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config | TLS configuration.
|
| options/nixos/services.fedimintd.<name>.api.url | Public URL of the API address of the reverse proxy/tls terminator
|
| options/nixos/services.fedimintd.<name>.api.bind | Address to bind on for API connections relied by the reverse proxy/tls terminator.
|
| options/nixos/services.fedimintd.<name>.api.port | Port to bind on for API connections relied by the reverse proxy/tls terminator.
|
| options/nixos/services.public-inbox.imap.port | Listening port
|
| options/nixos/services.public-inbox.nntp.port | Listening port
|
| options/nixos/services.postfix-tlspol.settings.server.socket-permissions | Permissions to the UNIX socket, if configured.
Due to hardening on the systemd unit the socket can never be created world readable/writable.
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.h2o.hosts.<name>.settings | Attrset to be transformed into YAML for host config
|
| options/nixos/services.rkvm.server.settings.key | TLS key path.
This should be generated with rkvm-certificate-gen.
|
| options/nixos/services.tlsrpt.reportd.settings.sender_address | Sender address used for reports.
|
| packages/nixpkgs/ghostunnel | TLS proxy with mutual authentication support for securing non-TLS backend applications |
| packages/nixpkgs/cfssl | Cloudflare's PKI and TLS toolkit |
| packages/nixpkgs/pounce | Simple multi-client TLS-only IRC bouncer |
| options/nixos/services.syncplay.useACMEHost | If set, use NixOS-generated ACME certificate with the specified name for TLS
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config | TLS configuration.
|
| options/nixos/virtualisation.podman.networkSocket.enable | Make the Podman and Docker compatibility API available over the network
with TLS client certificate authentication
|
| options/nixos/services.fedimintd.<name>.nginx.fqdn | Public domain of the API address of the reverse proxy/tls terminator.
|
| packages/nixpkgs/go-camo | Camo server is a special type of image proxy that proxies non-secure images over SSL/TLS |
| options/nixos/services.coder.wildcardAccessUrl | If you are providing TLS certificates directly to the Coder server, you must use a single certificate for the root and wildcard domains.
|
| options/nixos/services.zitadel.settings.TLS.KeyPath | Path to the TLS certificate private key.
|
| options/nixos/services.zitadel.settings.TLS.CertPath | Path to the TLS certificate.
|
| options/nixos/services.tailscale.permitCertUid | Username or user ID of the user allowed to to fetch Tailscale TLS certificates for the node.
|
| options/nixos/services.vsftpd.ssl_sslv2 | Only applies if ssl_enable is activated
|
| options/nixos/services.vsftpd.ssl_sslv3 | Only applies if ssl_enable is activated
|
| options/nixos/services.librespeed.domain | If not null, this will add an entry to services.librespeed.servers and
configure librespeed to use TLS.
|
| options/nixos/services.librenms.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.fediwall.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.dolibarr.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.agorakit.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.kanboard.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.mainsail.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.postfix.enableSmtp | Whether to enable the smtp service configured in the master.cf
|
| options/nixos/services.pixelfed.nginx.kTLS | Whether to enable kTLS support
|
| packages/nixpkgs/snicat | TLS & SNI aware netcat |
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config | TLS configuration.
|
| packages/nixpkgs/perl538Packages.NetSMTPTLSButMaintained | SMTP client supporting TLS and AUTH (DEPRECATED, use Net::SMTPS instead) |
| packages/nixpkgs/perl540Packages.NetSMTPTLSButMaintained | SMTP client supporting TLS and AUTH (DEPRECATED, use Net::SMTPS instead) |
| options/nixos/services.fedimintd.<name>.api_ws.url | Public URL of the API address of the reverse proxy/tls terminator
|
| options/nixos/security.acme.defaults.ocspMustStaple | Turns on the OCSP Must-Staple TLS extension
|
| options/nixos/services.fedimintd.<name>.api_ws.bind | Address to bind on for API connections relied by the reverse proxy/tls terminator.
|
| options/nixos/services.cassandra.remoteJmx | Cassandra ships with JMX accessible only from localhost
|
| options/nixos/services.komodo-periphery.ssl.enable | Whether to enable SSL/TLS support.
|
| options/nixos/services.fedimintd.<name>.api_ws.port | TCP Port to bind on for API connections relayed by the reverse proxy/tls terminator.
|
| options/nixos/services.radicle.httpd.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.tlsrpt.reportd.settings.sendmail_script | Path to a sendmail-compatible executable for delivery reports.
|
| packages/nixpkgs/ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/step-ca | Private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH |
| options/nixos/services.anuko-time-tracker.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.ghostunnel.servers | Server mode ghostunnels (TLS listener -> plain TCP/UNIX target)
|
| options/nixos/services.keycloak.database.useSSL | Whether the database connection should be secured by SSL / TLS
|
| options/nixos/services.nginx.virtualHosts.<name>.kTLS | Whether to enable kTLS support
|
| options/nixos/services.dolibarr.h2o.settings | Attrset to be transformed into YAML for host config
|
| options/nixos/services.coturn.listening-port | TURN listener port for UDP and TCP
|
| packages/nixpkgs/aws-c-io | AWS SDK for C module for IO and TLS |
| options/nixos/services.bookstack.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config | TLS configuration.
|
| options/nixos/services.biboumi.settings.ca_file | Specifies which file should be used as the list of trusted CA
when negotiating a TLS session.
|
| packages/nixpkgs/fizz | C++14 implementation of the TLS-1.3 standard |
| packages/nixpkgs/boringssl | Free TLS/SSL implementation |
| options/nixos/services.infinoted.securityPolicy | How strictly to enforce clients connection with TLS.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.ssl | Whether the server supports TLS
|
| options/nixos/services.neo4j.bolt.sslPolicy | Neo4j SSL policy for BOLT traffic
|
| options/nixos/services.jirafeau.nginxConfig.kTLS | Whether to enable kTLS support
|
| options/nixos/services.minio.certificatesDir | The directory where TLS certificates are stored.
|
| options/nixos/services.radicle.httpd.nginx | With this option, you can customize an nginx virtual host which already has sensible defaults for radicle-httpd
|
| options/nixos/services.kubernetes.pki.genCfsslAPICerts | Whether to automatically generate cfssl API webserver TLS cert and key,
if they don't exist.
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config | TLS configuration.
|
| options/nixos/services.zitadel.settings.TLS.Cert | The TLS certificate, as a base64-encoded string
|
| options/nixos/services.kubernetes.pki.cfsslAPIExtraSANs | Extra x509 Subject Alternative Names to be added to the cfssl API webserver TLS cert.
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.kTLS | Whether to enable kTLS support
|
| options/nixos/services.zitadel.settings.TLS.Key | The TLS certificate private key, as a base64-encoded string
|
| options/nixos/services.nghttpx.backends.*.params.sni | Override the TLS SNI field value
|
| options/nixos/services.jitsi-meet.nginx.enable | Whether to enable nginx virtual host that will serve the javascript application and act as
a proxy for the XMPP server
|
| options/nixos/services.tlsrpt.reportd.settings.organization_name | Name of the organization sending out the reports.
|
| options/nixos/services.firezone.server.smtp.implicitTls | Whether to use implicit TLS instead of STARTTLS (usually port 465)
|
| options/nixos/services.parsedmarc.settings.smtp.ssl | Use an encrypted SSL/TLS connection.
|
| options/nixos/services.parsedmarc.settings.imap.ssl | Use an encrypted SSL/TLS connection.
|
| options/nixos/services.discourse.mail.outgoing.forceTLS | Force implicit TLS as per RFC 8314 3.3.
|
| options/nixos/services.keycloak.database.caCert | The SSL / TLS CA certificate that verifies the identity of the
database server
|
| options/nixos/services.keycloak.sslCertificate | The path to a PEM formatted certificate to use for TLS/SSL
connections.
|
| options/nixos/services.firezone.server.api.externalUrl | The external URL under which you will serve the api
|
| options/nixos/services.firezone.server.web.externalUrl | The external URL under which you will serve the web interface
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.fedimintd.<name>.nginx.config.kTLS | Whether to enable kTLS support
|
| options/nixos/services.keycloak.sslCertificateKey | The path to a PEM formatted private key to use for TLS/SSL
connections.
|
| options/nixos/services.nginx.recommendedTlsSettings | Enable recommended TLS settings.
|
| options/nixos/services.trafficserver.sni | Configure aspects of TLS connection handling for both inbound and
outbound connections
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.infinoted.certificateFile | Server certificate to use for TLS
|
| options/nixos/services.documize.forcesslport | Redirect given http port number to TLS.
|
| options/nixos/services.prometheus.exporters.lnd.lndTlsPath | Path to lnd TLS certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.sftpgo.settings.smtp.encryption | Encryption scheme:
0: No encryption
1: TLS
2: STARTTLS
|
| options/nixos/services.jitsi-meet.prosody.lockdown | Whether to disable Prosody features not needed by Jitsi Meet
|
| options/nixos/services.matrix-conduit.settings.global.address | Address to listen on for connections by the reverse proxy/tls terminator.
|
| options/nixos/services.kubernetes.apiserver.extraSANs | Extra x509 Subject Alternative Names to be added to the kubernetes apiserver tls cert.
|
| packages/nixpkgs/sniproxy | Transparent TLS and HTTP layer 4 proxy with SNI support |
| options/nixos/services.firefox-syncserver.singleNode.enableTLS | Whether to enable automatic TLS setup.
|
| options/nixos/services.sabnzbd.settings.misc.https_key | Path to the TLS key for the web UI
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.infinoted.certificateChain | Chain of CA-certificates to which our certificateFile is relative
|
| packages/nixpkgs/gungnir | Command-line tool that continuously monitors certificate transparency (CT) logs for newly issued SSL/TLS certificates |
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.limesurvey.nginx.virtualHost.kTLS | Whether to enable kTLS support
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.sabnzbd.settings.misc.https_cert | Path to the TLS certificate for the web UI
|
| options/nixos/services.rkvm.server.settings.certificate | TLS certificate path.
This should be generated with rkvm-certificate-gen.
|
| options/nixos/services.rkvm.client.settings.certificate | TLS ceritficate path.
This should be generated with rkvm-certificate-gen.
|
| packages/nixpkgs/stunnel | Universal tls/ssl wrapper |
| options/nixos/services.prometheus.exporters.ipmi.webConfigFile | Path to configuration file that can enable TLS or authentication.
|
| options/nixos/services.technitium-dns-server.firewallTCPPorts | List of TCP ports to open in firewall
|
| packages/nixpkgs/alpnpass | Inspect the plaintext payload inside of proxied TLS connections |
| packages/nixpkgs/ssldump | SSLv3/TLS network protocol analyzer |
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.opencloud.environment | Extra environment variables to set for the service
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| packages/nixpkgs/catgirl | TLS-only terminal IRC client |
| options/nixos/services.bitwarden-directory-connector-cli.ldap.ssl | Whether to use TLS.
|
| options/nixos/services.matrix-tuwunel.settings.global.address | Addresses (IPv4 or IPv6) to listen on for connections by the reverse proxy/tls terminator
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| packages/nixpkgs/linuxPackages.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.mosquitto.listeners.*.omitPasswordAuth | Omits password checking, allowing anyone to log in with any user name unless
other mandatory authentication methods (eg TLS client certificates) are configured.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/virtualisation.podman.networkSocket.port | TCP port number for receiving TLS connections.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.matrix-synapse.settings.listeners.*.path | Unix domain socket path to bind this listener to.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| packages/nixpkgs/litterbox | Simple TLS-only IRC logger |
| packages/nixpkgs/linuxPackages_lqx.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/linuxPackages_zen.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| options/nixos/virtualisation.podman.networkSocket.server | Choice of TLS proxy server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| packages/nixpkgs/ocamlPackages.logs-syslog | Logs reporter to syslog (UDP/TCP/TLS) |
| options/nixos/services.yggdrasil-jumper.appendListenAddresses | Append Yggdrasil router configuration with listeners on loopback
addresses (127.0.0.1) and preselected ports to support peering
using client-server protocols like quic and tls
|
| packages/nixpkgs/luajitPackages.luasec | A binding for OpenSSL library to provide TLS/SSL communication over LuaSocket. |
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.ssl_verify | Level of TLS verification
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.noTLSVerify | Disables TLS verification of the certificate presented by your origin
|
| options/nixos/services.prometheus.exporters.pgbouncer.webConfigFile | Path to configuration file that can enable TLS or authentication.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/virtualisation.podman.networkSocket.listenAddress | Interface address for receiving TLS connections.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.changedetection-io.behindProxy | Enable this option when changedetection-io runs behind a reverse proxy, so that it trusts X-* headers
|
| packages/nixpkgs/linuxPackages_xanmod.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/luaPackages.luasec | A binding for OpenSSL library to provide TLS/SSL communication over LuaSocket. |
| packages/nixpkgs/linuxPackages_latest.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.parsedmarc.settings.elasticsearch.ssl | Whether to use an encrypted SSL/TLS connection.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| packages/nixpkgs/lua53Packages.luasec | A binding for OpenSSL library to provide TLS/SSL communication over LuaSocket. |
| packages/nixpkgs/lua54Packages.luasec | A binding for OpenSSL library to provide TLS/SSL communication over LuaSocket. |
| packages/nixpkgs/lua51Packages.luasec | A binding for OpenSSL library to provide TLS/SSL communication over LuaSocket. |
| packages/nixpkgs/lua52Packages.luasec | A binding for OpenSSL library to provide TLS/SSL communication over LuaSocket. |
| packages/nixpkgs/lua55Packages.luasec | A binding for OpenSSL library to provide TLS/SSL communication over LuaSocket. |
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.connectTimeout | Timeout for establishing a new TCP connection to your origin server
|
| options/nixos/services.matrix-continuwuity.settings.global.address | Addresses (IPv4 or IPv6) to listen on for connections by the reverse proxy/tls terminator
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| packages/nixpkgs/ocamlPackages_latest.logs-syslog | Logs reporter to syslog (UDP/TCP/TLS) |
| packages/nixpkgs/python313Packages.acme-tiny | Tiny script to issue and renew TLS certs from Let's Encrypt |
| packages/nixpkgs/python314Packages.acme-tiny | Tiny script to issue and renew TLS certs from Let's Encrypt |
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.kubernetes.apiserver.serviceAccountKeyFile | File containing PEM-encoded x509 RSA or ECDSA private or public keys,
used to verify ServiceAccount tokens
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| packages/nixpkgs/stubby | Local DNS Privacy stub resolver (using DNS-over-TLS) |
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| packages/nixpkgs/bearssl | Implementation of the SSL/TLS protocol written in C |
| packages/nixpkgs/openssl | Cryptographic library that implements the SSL and TLS protocols |
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.biboumi.settings.policy_directory | A directory that should contain the policy files,
used to customize Botan’s behaviour
when negotiating the TLS connections with the IRC servers.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.nextcloud.settings.mail_smtpsecure | This depends on mail_smtpmode
|
| packages/nixpkgs/wolfssl | Small, fast, portable implementation of TLS/SSL for embedded devices |
| options/nixos/services.parsedmarc.settings.elasticsearch.cert_path | The path to a TLS certificate bundle used to verify
the server's certificate.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.serverport | imap port number (at the moment only tls connection is supported)
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| packages/nixpkgs/python313Packages.sslpsk-pmd3 | Adds TLS-PSK support to the Python ssl package |
| packages/nixpkgs/python314Packages.sslpsk-pmd3 | Adds TLS-PSK support to the Python ssl package |
| packages/nixpkgs/python312Packages.acme-tiny | Tiny script to issue and renew TLS certs from Let's Encrypt |
| packages/nixpkgs/python313Packages.trustme | High quality TLS certs while you wait, for the discerning tester |
| packages/nixpkgs/python314Packages.trustme | High quality TLS certs while you wait, for the discerning tester |
| options/nixos/services.neo4j.directories.certificates | Directory for storing certificates to be used by Neo4j for
TLS connections
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| packages/nixpkgs/sslsplit | Transparent SSL/TLS interception |
| packages/nixpkgs/radsecproxy | Generic RADIUS proxy that supports both UDP and TLS (RadSec) RADIUS transports |
| packages/nixpkgs/libressl | Free TLS/SSL implementation |
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.path | Unix domain socket path to bind this listener to.
|
| packages/nixpkgs/certmitm | Tool for testing for certificate validation vulnerabilities of TLS connections |
| packages/nixpkgs/openssl_3 | Cryptographic library that implements the SSL and TLS protocols |
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| packages/nixpkgs/azure-sdk-for-cpp.openssl | Cryptographic library that implements the SSL and TLS protocols |
| packages/nixpkgs/linuxKernel.packages.linux_6_1.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/linuxKernel.packages.linux_6_6.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/linuxKernel.packages.linux_lqx.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/linuxKernel.packages.linux_zen.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/perlPackages.IOAsyncSSL | Use SSL/TLS with IO::Async |
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| packages/nixpkgs/perl5Packages.IOAsyncSSL | Use SSL/TLS with IO::Async |
| packages/nixpkgs/python312Packages.sslpsk-pmd3 | Adds TLS-PSK support to the Python ssl package |
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| packages/nixpkgs/linuxKernel.packages.linux_6_17.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/linuxKernel.packages.linux_6_18.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/linuxKernel.packages.linux_5_15.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/linuxKernel.packages.linux_6_12.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/linuxKernel.packages.linux_6_19.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/linuxKernel.packages.linux_5_10.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/python312Packages.trustme | High quality TLS certs while you wait, for the discerning tester |
| packages/nixpkgs/haskellPackages.wai-cli | Command line runner for Wai apps (using Warp) with TLS, CGI, socket activation & graceful shutdown |
| packages/nixpkgs/haskellPackages.http-slim | A library for client/server HTTP with TLS support |
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| packages/nixpkgs/openssl_1_1 | Cryptographic library that implements the SSL and TLS protocols |
| packages/nixpkgs/openssl_3_6 | Cryptographic library that implements the SSL and TLS protocols |
| packages/nixpkgs/haskellPackages.hookup | Abstraction over creating network connections with SOCKS5 and TLS |
| packages/nixpkgs/openssl_oqs | Cryptographic library that implements the SSL and TLS protocols |
| packages/nixpkgs/buildcatrust | Build SSL/TLS trust stores |
| packages/nixpkgs/haskellPackages.ech-config | Config for TLS Encrypted Client Hello |
| packages/nixpkgs/monkeysphere | Leverage the OpenPGP web of trust for SSH and TLS authentication |
| packages/nixpkgs/perl540Packages.IOAsyncSSL | Use SSL/TLS with IO::Async |
| packages/nixpkgs/perl538Packages.IOAsyncSSL | Use SSL/TLS with IO::Async |
| packages/nixpkgs/haskellPackages.htalkat | Talk across TLS |
| packages/nixpkgs/akkuPackages.TerribleTLS | Inadvisible pure-Scheme TLS 1.2 client |
| packages/nixpkgs/libressl_4_2 | Free TLS/SSL implementation |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/libressl_4_0 | Free TLS/SSL implementation |
| packages/nixpkgs/chickenPackages_5.chickenEggs.openssl | Bindings to the OpenSSL SSL/TLS library |
| packages/nixpkgs/libressl_4_1 | Free TLS/SSL implementation |
| packages/nixpkgs/haskellPackages.tcp-streams | One stop solution for tcp client and server with tls support |
| packages/nixpkgs/python313Packages.aioopenssl | TLS-capable transport using OpenSSL for asyncio |
| packages/nixpkgs/python314Packages.aioopenssl | TLS-capable transport using OpenSSL for asyncio |
| packages/nixpkgs/haskellPackages.mail-reports | A parser library for DMARC and SMTP TLS reports |
| packages/nixpkgs/linuxPackages_xanmod_stable.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/linuxPackages_xanmod_latest.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/haskellPackages.HaskellNet-SSL | Helpers to connect to SSL/TLS mail servers with HaskellNet |
| packages/nixpkgs/haskellPackages.soap-openssl | TLS-enabled SOAP transport (using openssl bindings) |
| packages/nixpkgs/python313Packages.ts1-signatures | TLS and HTTP signature and fingerprint library |
| packages/nixpkgs/python314Packages.ts1-signatures | TLS and HTTP signature and fingerprint library |
| packages/nixpkgs/haskellPackages.monad-connect | Transformer for TCP connection with TLS and SOCKS support |
| packages/nixpkgs/python312Packages.aioopenssl | TLS-capable transport using OpenSSL for asyncio |
| packages/nixpkgs/openssl_legacy | Cryptographic library that implements the SSL and TLS protocols |
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth | Authentication to expect from remote
|
| packages/nixpkgs/linuxKernel.packages.linux_hardened.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/python312Packages.ts1-signatures | TLS and HTTP signature and fingerprint library |
| packages/nixpkgs/haskellPackages.network-simple-wss | Simple interface to TLS secured WebSockets |
| packages/nixpkgs/python313Packages.sleekxmppfs | Fork of SleekXMPP with TLS cert validation disabled, intended only to be used with the sucks project |
| packages/nixpkgs/python314Packages.sleekxmppfs | Fork of SleekXMPP with TLS cert validation disabled, intended only to be used with the sucks project |
| packages/nixpkgs/haskellPackages.tcp-streams-openssl | Tcp streams using openssl for tls support |
| packages/nixpkgs/haskellPackages.thread-local-storage | Several options for thread-local-storage (TLS) in Haskell |
| packages/nixpkgs/python313Packages.buildcatrust | Build SSL/TLS trust stores |
| packages/nixpkgs/python312Packages.sleekxmppfs | Fork of SleekXMPP with TLS cert validation disabled, intended only to be used with the sucks project |
| packages/nixpkgs/python314Packages.buildcatrust | Build SSL/TLS trust stores |
| packages/nixpkgs/haskellPackages.mysql-haskell-openssl | TLS support for mysql-haskell package using openssl |
| packages/nixpkgs/python312Packages.buildcatrust | Build SSL/TLS trust stores |
| packages/nixpkgs/linuxKernel.packages.linux_6_12_hardened.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_stable.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_latest.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| options/nixos/services.agate.onlyTls_1_3 | Only use TLSv1.3 (default also allows TLSv1.2).
|
| options/nixos/services.transfer-sh.secretFile | Path to file containing environment variables
|
| options/nixos/security.pam.dp9ik.enable | Whether to enable the dp9ik pam module provided by tlsclient
|
| packages/nixpkgs/_3proxy | Tiny free proxy server |
| packages/nixpkgs/incus | Powerful system container and virtual machine manager |
| packages/nixpkgs/incus-lts | Powerful system container and virtual machine manager |
| packages/nixpkgs/hash-slinger | Various tools to generate special DNS records |
| packages/nixpkgs/letsdns | Manage DANE TLSA records in DNS servers |
| packages/nixpkgs/cyrus-imapd | Email, contacts and calendar server |
| packages/nixpkgs/pam_dp9ik | dp9ik pam module |
| packages/nixpkgs/libcyaml | C library for reading and writing YAML |
| packages/nixpkgs/texliveBasic | TeX Live environment |
| packages/nixpkgs/texliveMinimal | TeX Live environment |
| packages/nixpkgs/texliveBookPub | TeX Live environment |
| packages/nixpkgs/texliveConTeXt | TeX Live environment |
| packages/nixpkgs/texliveSmall | TeX Live environment |
| packages/nixpkgs/texliveGUST | TeX Live environment |
| packages/nixpkgs/texliveTeTeX | TeX Live environment |
| packages/nixpkgs/texliveMedium | TeX Live environment |
| packages/nixpkgs/texliveFull | TeX Live environment |
| packages/nur/linyinfeng.ssl-handshake | A command-line tool for testing SSL/TLS handshake latency |
| packages/nur/moraxyc.boringssl-oqs | Fork of BoringSSL that includes prototype quantum-resistant key exchange and authentication in the TLS handshake based on liboqs |
| packages/nur/xddxdd.boringssl-oqs | Fork of BoringSSL that includes prototype quantum-resistant key exchange and authentication in the TLS handshake based on liboqs |
| packages/nur/xddxdd.uncategorized.boringssl-oqs | Fork of BoringSSL that includes prototype quantum-resistant key exchange and authentication in the TLS handshake based on liboqs |
| packages/nur/bandithedoge.curl-gnutls3 | libcurl with libcurl3 symbols |
| packages/nur/oluceps.shadow-tls | Please invoke this with flake input, not avaliable with nur.repos.me.* |
| packages/nur/oluceps.restls | Please invoke this with flake input, not avaliable with nur.repos.me.* |
| packages/nur/sikmir.tlstunnel | A TLS reverse proxy unikernel |
| packages/nur/sikmir.rtlsdr-airband | Multichannel AM/NFM demodulator |